Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4,6 TrustPilot
logo-home
Examen

CISA EXAM 2 – Questions With Reliable Solutions

Note
-
Vendu
-
Pages
125
Grade
A+
Publié le
07-01-2026
Écrit en
2025/2026

CISA EXAM 2 – Questions With Reliable Solutions

Établissement
CISA - Certified Information Systems Auditor
Cours
CISA - Certified Information Systems Auditor











Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

École, étude et sujet

Établissement
CISA - Certified Information Systems Auditor
Cours
CISA - Certified Information Systems Auditor

Infos sur le Document

Publié le
7 janvier 2026
Nombre de pages
125
Écrit en
2025/2026
Type
Examen
Contient
Questions et réponses

Sujets

Aperçu du contenu

CISA EXAM 2 – Questions With Reliable Solutions

Save




Terms in this set (150)



Q1) Which of the following is the B) Perform an end-to-end walk-through of the
MOST efficient and sufficiently reliable process is correct. Observation is the best and most
way to test the design effectiveness of effective method to test changes to ensure that the
a change control process? process is effectively designed.


A) Interview personnel in charge of D) Test a sample population of change requests is
the change control process incorrect. Testing a sample population of changes is
a test of compliance and operating effectiveness to
B) Perform an end-to-end walk- ensure that users submitted the proper
through of the process documentation/requests. It does not test the
effectiveness of the design.
C) Test a sample of authorized
changes C) Test a sample of authorized changes is incorrect.
Testing changes that have been authorized may not
D) Test a sample population of change provide sufficient assurance of the entire process
requests because it does not test the elements of the process
related to authorization or detect changes that
bypassed the controls.


A) Interview personnel in charge of the change
control process is incorrect. This is not as effective as
a walk-through of the change controls process
because people may know the process but not
follow it.

,Q2) An organization provides C) The firewall is placed on top of the commercial
information to its supply chain operating system with all default installation options
partners and customers through an is correct. The greatest concern when implementing
extranet infrastructure. Which of the firewalls on top of commercial operating systems is
following should be the GREATEST the potential presence of vulnerabilities that could
concern to an IS auditor reviewing the undermine the security posture of the firewall
firewall security architecture? platform itself. In most circumstances, when
commercial firewalls are breached, that breach is
A) Inbound traffic is blocked unless facilitated by vulnerabilities in the underlying
the traffic type and connections have operating system. Keeping all installation options
been specifically permitted. available on the system further increases the risk of
vulnerabilities and exploits.
B) A Secure Sockets Layer has been
implemented for user authentication B) A Secure Sockets Layer has been implemented for
and remote administration of the user authentication and remote administration of the
firewall. firewall is incorrect. Using Secure Sockets Layer for
firewall administration is important because changes
C) The firewall is placed on top of the in user and supply chain partners' roles and profiles
commercial operating system with all will be dynamic.
default instillation options.
D) Firewall policies are updated on the basis of
D) Firewall policies are updated on changing requirements is incorrect. It is appropriate
the basis of changing requirements to maintain the firewall policies as needed.


A) Inbound traffic is blocked unless the traffic type
and connections have been specifically permitted is
incorrect. It is prudent to block all inbound traffic to
an extranet unless permitted.

,Q3) Which of the following choices C) Senior management identify key business
would be the BEST source of processes is correct. Developing a risk-based audit
information when developing a risk- plan must start with the identification of key business
based audit plan? processes, which determine and identify the risk that
needs to be addressed.
A) System custodians identify
vulnerabilities. B) Process owners identify key controls is incorrect.
Although process owners should be consulted to
B)Process owners identify key identify key controls, senior management is a better
controls. source to identify business processes, which are
more important. System custodians identify
C) Senior management identify key vulnerabilities is incorrect.
business processes.
A) System custodians are a good source to better
D) Peer auditors understand previous understand the risk and controls as they apply to
audit results. specific applications; however, senior management is
a better source to identify business processes, which
are more important.


D) Peer auditors understand previous audit results is
incorrect. The review of previous audit results is one
input into the audit planning process; however, if
previous audits focused on a limited or a restricted
scope or if the key business processes have changed
and/or new business processes have been
introduced, then this does contribute to the
development of a risk-based audit plan.

, Q4) Which of the following inputs D) The IT project portfolio analysis is correct.
adds the MOST value to the strategic Portfolio analysis provides the best input into the
IT initiative decision-making process? decision-making process relating to planning
strategic IT initiatives. An analysis of the IT portfolio
A)The maturity of the project provides comparable information of planned
management process initiatives, projects and ongoing IT services, which
allows the IT strategy to be aligned with the business
B) The regulatory environment strategy.


C) Past audit findings A) The maturity of the project management process
is incorrect. The maturity of the project management
D) The IT project portfolio analysis process is more important with respect to managing
the day-to-day operations of IT versus performing
strategic planning.


B) The regulatory environment is incorrect.
Regulatory requirements may drive investment in
certain technologies and initiatives; however, having
to meet regulatory requirements is not typically the
main focus of the IT and business strategy.


C) Past audit findings is incorrect. Past audit findings
may drive investment in certain technologies and
initiatives; however, having to remediate past audit
findings is not the main focus of the IT and business
strategy.
€31,52
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Faites connaissance avec le vendeur

Seller avatar
Les scores de réputation sont basés sur le nombre de documents qu'un vendeur a vendus contre paiement ainsi que sur les avis qu'il a reçu pour ces documents. Il y a trois niveaux: Bronze, Argent et Or. Plus la réputation est bonne, plus vous pouvez faire confiance sur la qualité du travail des vendeurs.
LeCrae Harvard University
S'abonner Vous devez être connecté afin de suivre les étudiants ou les cours
Vendu
2044
Membre depuis
3 année
Nombre de followers
1407
Documents
21294
Dernière vente
1 jours de cela
Valuable Notes, Secure Learning

Welcome to ScholarVault—your ultimate destination for premium study materials and academic resources designed to unlock your full potential. As a passionate student myself, I understand how critical it is to have the right tools to excel in your studies. That's why I've curated a collection of high-quality notes, guides, and exam preparation materials that are tailored to help you achieve academic success. At ScholarVault, I believe that knowledge is power, but access to the right knowledge is key. My mission is to provide you with organized, comprehensive, and easy-to-understand study resources that make your learning journey smoother and more effective. Whether you're preparing for exams, reviewing class notes, or tackling tough concepts, you can count on me to deliver valuable, well-crafted content that aligns with your academic goals. Each resource has been carefully created with the intention to simplify complex topics, boost your confidence, and save you time. I aim to provide not just notes, but tools that truly make a difference in how you approach your studies. Explore the vault and discover everything you need to succeed—whether it’s detailed notes, in-depth study guides, or concise exam tips, everything is stored here for your academic growth. Thank you for trusting ScholarVault to be part of your learning experience. I’m excited to help you unlock your academic potential and achieve the success you deserve.

Lire la suite Lire moins
4,0

433 revues

5
202
4
106
3
70
2
16
1
39

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions